Anonymous authentication based on cloud storage for cross-regional vehicles in VANET

In VANET, remote network authentication servers can not authenticate the identity of vehicles without the aid of home domain authentication servers if the vehicles are in non-local regions, resulting in longer communication delay. To address this problem, an anonymous authentication scheme based on cloud storage (AABCS) for cross-regional vehicles in VANET is proposed. The secure cloud storage technology is used to build a public traffic cloud (TFC) as a storage media to avoid the problem of a single point failure. In the process of cross-regional authentication, vehicles first send the authentication request that contains the registration information to the non-local authentication server. Then, the non-local authentication server validates the vehicles directly through a round of information interaction. By security and performance analysis, the use of secure cloud storage technology can improve the efficiency of the cross-regional authentication in VANET without undermining the vehicle safety.

[1]  Feng Chao Techniques of Secure Storage for Cloud Data , 2015 .

[2]  Wang Xin Survey on Security in Vehicular Ad Hoc Networks , 2011 .

[3]  Jiang Qi Security Integration of WAPI Based WLAN and 3G , 2010 .

[4]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.

[5]  Zhuo Ma,et al.  Security Integration of WAPI Based WLAN and 3G: Security Integration of WAPI Based WLAN and 3G , 2010 .

[6]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[7]  Hugo Krawczyk,et al.  A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract) , 1998, STOC '98.

[8]  Tao Zhang,et al.  Blend-In: A Privacy-Enhancing Certificate-Selection Method for Vehicular Communication , 2009, IEEE Transactions on Vehicular Technology.

[9]  Mohammed Saeed Al-kahtani,et al.  Survey on security attacks in Vehicular Ad hoc Networks (VANETs) , 2012, 2012 6th International Conference on Signal Processing and Communication Systems.

[10]  Fu Ra Survey of Secure Cloud Storage , 2014 .

[11]  Pin-Han Ho,et al.  On batch verification with group testing for vehicular communications , 2011, Wirel. Networks.

[12]  Panagiotis Papadimitratos,et al.  On the Performance of Secure Vehicular Communication Systems , 2011, IEEE Transactions on Dependable and Secure Computing.

[13]  Boucif Amar Bensaber,et al.  Protocol of change pseudonyms for VANETs , 2013, 38th Annual IEEE Conference on Local Computer Networks - Workshops.

[14]  Hugo Krawczyk,et al.  Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.

[15]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.